نتایج جستجو برای: sha 3

تعداد نتایج: 1812667  

2008
Ivica Nikolic Alex Biryukov

In this article we find collisions for step-reduced SHA-256. We develop a differential that holds with high probability if the message satisfies certain conditions. We solve the equations that arise from the conditions. Due to the carefully chosen differential and word differences, the message expansion of SHA-256 has little effect on spreading the differences in the words. This helps us to fin...

Journal: :IACR Cryptology ePrint Archive 2010
Mourad Gouicem

In this work, we present and compare seven SHA-3 second-round candidates implementations on two different architectures used on smart cards: the Intel 8051 and the ARM7TDMI. After presenting the performances of our implementations, we explain for each candidate the main differences between our 8-bit and 32-bit implementations. Then, we compare our results to those of two benchmarks published at...

Journal: :IACR Cryptology ePrint Archive 2012
Kris Gaj Ekawat Homsirikamol Marcin Rogawski Rabia Shahid Umar Sharif

In this paper we present a comprehensive comparison of all Round 3 SHA-3 candidates and the current standard SHA-2 from the point of view of hardware performance in modern FPGAs. Each algorithm is implemented using multiple architectures based on the concepts of iteration, folding, unrolling, pipelining, and circuit replication. Trade-offs between speed and area are investigated, and the best a...

2007
Makoto Sugita Mitsuru Kawazoe Ludovic Perret Hideki Imai

In 2004, a new attack against SHA-1 has been proposed by a team leaded by Wang [15]. The aim of this article is to sophisticate and improve Wang’s attack by using algebraic techniques. We introduce new notions, namely semi-neutral bit and adjuster and propose then an improved message modification technique based on algebraic techniques. In the case of the 58-round SHA-1, the experimental comple...

2014
Ronglin Hao Bao Li Bingke Ma Ling Song

The cryptographic hash function SHA-256 is one member of the SHA-2 hash family, which was proposed in 2000 and was standardized by NIST in 2002 as a successor of SHA-1. Although the differential fault attack on SHA-1compression function has been proposed, it seems hard to be directly adapted to SHA-256. In this paper, an efficient algebraic fault attack on SHA-256 compression function is propos...

Journal: :Environmental science & technology 2004
John J Lenhart James E Saiers

To better understand how interactions with the air phase influence the movement of natural organic matter (NOM) through the vadose zone, we measured the transport of soil-humic acid (SHA) through laboratory columns packed with partially saturated sand. Our results demonstrate that sorptive reactions at air-water interfaces reduce SHA mobility and that the affinity of SHA for the air phase incre...

Journal: :IACR Cryptology ePrint Archive 2009
Yu Sasaki Lei Wang Kazumaro Aoki

In this paper, we propose preimage attacks on 41-step SHA-256 and 46-step SHA-512, which drastically increase the number of attacked steps compared to the best previous preimage attack working for only 24 steps. The time complexity for 41-step SHA-256 is 2 compression function operations and the memory requirement is 2 × 10 words. The time complexity for 46-step SHA-512 is 2 compression functio...

Journal: :Physiology & behavior 1989
R Cooper J J McGrath S Dooley M T Kopetzky

The effects of breathing CO continuously at high altitude on the mean electrical axis of the heart, hematocrit ratio and body weight were studied in laboratory rats. Laboratory rats were exposed for 6 weeks to: 100 or 500 ppm CO; 15,000 feet stimulated high altitude (SHA); or 100 or 500 ppm CO at SHA. SHA decreased body weight significantly; CO and CO-SHA interaction had no significant effect o...

Journal: :Journal of Systems Architecture 2006
Ryan Glabb Laurent Imbert Graham A. Jullien Arnaud Tisserand Nicolas Veyrat-Charvillon

We propose an improved implementation of the SHA-2 hash family, with minimal operator latency and reduced hardware requirements. We also propose a high frequency version at the cost of only two cycles of latency per message. Finally we present a multi-mode architecture able to perform either a SHA-384 or SHA-512 hash or to behave as two independent SHA-224 or SHA-256 operators. Such capability ...

2004

A 224-bit One-way Hash Function: SHA-224 Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document specifies a 224-bit one-way hash function, called SHA-224. SHA-224 is based on SHA-256, but it uses a different initial value and the result is truncated to 224...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید